Contents
1-1. Connecting Securely to a Remote Server
1-2. Logging on Remotely via the Command Line
1-6. Correcting Command-Line Mistakes
Chapter 2: Working in the Shell
2-1. Displaying the Current Shell
2-2. Running Previously Entered Commands
2-3. Automatically Completing Long Commands
2-4. Viewing Environment Variables
2-5. Automatically Setting Shell Variables
2-6. Customizing the Command Prompt
2-7. Creating a Command Shortcut
2-8. Providing Input to Commands
2-9. Redirecting Command Output
2-10. Sending Output to Nowhere
2-11. Displaying and Capturing Command Output
2-12. Recording All Shell Command Output
2-13. Changing the Login Shell
2-14. Modifying Command Path Search
2-15. Viewing Built-in Commands
2-16. Setting the Backspace Key
2-17. Typing a Long Command in Multiple Lines
Chapter 3: Managing Processes and Users
3-3. Listing the Users Logged On
3-4. Listing the Last Logon Time of a User
3-5. Limiting the Number of User Processes
3-6. Viewing How Long the Server Has Been Running
3-7. Viewing How Long a Process Has Been Running
3-10. Becoming the System Privileged (root) User
3-11. Running Commands as the root User
Chapter 4: Creating and Editing Files
4-2. Maneuvering Within a File
4-5. Searching for and Replacing Text
4-6. Inserting One File into Another
4-8. Running Operating System Commands
4-12. Automatically Configuring Settings
4-13. Creating Shortcuts for Commands
4-14. Setting the Shell Default Text Editor
4-15. Setting the SQL*Plus Text Editor
4-16. Toggling Syntax Text Color
Chapter 5: Managing Files and Directories
5-1. Showing the Current Working Directory
5-4. Viewing a List of Directories
5-8. Changing File Permissions
5-9. Changing File Ownership and Group Membership
5-10. Viewing the Contents of a Text File
5-11. Viewing Nonprinting Characters in a File
5-14. Finding Differences Between Files
5-15. Comparing Contents of Directories
5-18. Moving Files and Directories
5-19. Renaming a File or Directory
5-21. Removing Protected Files Without Being Prompted
5-22. Removing Oddly Named Files
5-24. Finding Strings in Files
5-25. Finding a Recently Modified File
5-26. Finding and Removing Old Files
5-27. Finding the Largest Files
5-28. Finding a File of a Certain Size
5-30. Finding the Largest Space-Consuming Directories
5-31. Truncating an Operating System File
5-32. Counting Lines and Words in a File
5-33. Creating a Second Name for a File
5-34. Creating a Second Name for a Directory
Chapter 6: Archiving and Compressing Files
6-2. Unbundling Files Using tar
6-3. Finding Differences in Bundled Files Using tar
6-4. Bundling Files Using cpio
6-5. Unbundling Files Using cpio
6-7. Unbundling Files Using zip
6-8. Bundling Files Using find
6-9. Compressing and Uncompressing Files
6-10. Validating File Contents
7-1. Writing a Simple Shell Script
7-2. Checking Simple Conditions
7-4. Checking Complex Conditions
7-6. Iterating Until a Condition Is Met
7-7. Displaying a Menu of Choices
7-8. Running Commands Based on Success/Failure of the Previous Command
7-10. Passing Parameters to Scripts
7-12. Running Database Commands in Scripts
7-13. Crafting a Robust DBA Shell Script
7-14. Running Scripts in the Background
7-15. Monitoring the Progress of a Script
Chapter 8: Analyzing Server Performance
8-1. Identifying System Bottlenecks
8-2. Analyzing Current and Past System Performance
8-3. Identifying CPU-Intensive Processes
8-4. Identifying CPU Bottlenecks
8-5. Identifying Memory-Intensive Processes
8-6. Identifying Memory Bottlenecks
8-7. Identifying I/O-Intensive Processes
8-8. Identifying I/O Bottlenecks
8-9. Monitoring Network Traffic
8-10. Troubleshooting Database Connectivity
8-12. Listing Files Opened by Processes
Chapter 9: Viewing and Configuring System Resources
9-1. Displaying Server Hardware and the Operating System
9-3. Displaying Physical Memory
9-4. Viewing Kernel Parameters
9-5. Modifying Kernel Parameters
9-8. Viewing Memory Structures
9-9. Removing In-Memory Structures
9-10. Viewing Network Configuration Settings
9-11. Configuring Network Settings
9-12. Modifying System Open File Limits
Chapter 10: Automating Jobs with cron
10-1. Enabling Access to Schedule Jobs
10-3. Understanding cron Table Entries
10-4. Setting Operating System Variables
10-5. Specifying the Execution Shell
10-7. Embedding Conditional Logic
Chapter 11: Managing Server Software
11-2. Switching to the Oracle Unbreakable Linux Network
11-3. Associating Linux Files with RPM Packages
11-4. Listing the Contents of an RPM Package
11-6. Automating Server Builds with Oracle RDBMS Server PreInstall RPM
11-9. Checking RPM Requirements to Install Oracle Database
11-10. Performing Initial Silent Oracle Software Installation with Response Files
11-11. Creating a Database with a Response File
11-12. Creating a Network Configuration with a Response File
11-13. Applying Patch Set Updates (PSUs) and Interim Patches
11-15. Attaching an Oracle Home
Chapter 12: VirtualBox for Oracle
12-1. Installing Oracle VM VirtualBox
12-2. Setting Up VirtualBox Virtual Machine (VM)
12-3. Starting Up a VM for the First Time
12-4. Creating Additional Virtual Disks
12-5. Provisioning/Sharing a Disk with Another VM
12-6. Configuring the Virtual Network
12-7. Leveraging/Creating Oracle VM VirtualBox Prebuilt Templates
Solution #1: Leveraging Oracle’s Prebuilt Template
Solution #2: Creating Your Own OVA Template
Chapter 13: Optimizing Linux for Oracle Databases
13-1. Minimalizing the Linux Environment for Performance and Security
Automating Hugepages Server Configuration
Computing the Value of Huge Pages on an Existing Linux Server
Disabling Transparent Huge Pages
13-4. Determining and Implementing the Right I/O Scheduler
13-5. Setting Pertinent Kernel Parameters for Oracle Databases
13-6. Configuring NTP for Oracle
13-7. Bonding Network Interfaces
13-8. Enabling Network Services Cache Daemon (nscd)
13-9. Aligning Disk Part itions Correctly
Chapter 14: Working Securely Across a Network
14-5. Authenticating Through Public Keys
14-6. Configuring a Promptless Logon
15-4. Displaying an X Client on a Remote Server
15-6. Manipulating the Terminal Emulator for X Windows
Chapter 16: Managing Remote Servers with VNC
16-1. Downloading the VNC Software
16-2. Installing the VNC Software
16-3. Manually Starting and Stopping the VNC Server
16-4. Automatically Starting the VNC Server on Linux
16-5. Automatically Starting the VNC Server on Solaris
16-7. Securing a VNC Connection
16-8. Accessing VNC via a Proxy Server
16-9. Running X Applications with VNC
Defining Array, Stripe Width, Stripe Size, Chunk Size
Building Hybrid (Nested) RAID Devices
Setting Up a Custom Log Rotation